
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 107 matches
- 2020
- Yilong Zheng
, Shunfang Hu, Liangxiong Wei, Yanru Chen, Hao Wang, Yanbing Yang
, Yang Li, Bingjie Xu, Wei Huang
, Liangyin Chen
:
Design and Analysis of a Security-Enhanced Three-Party Authenticated Key Agreement Protocol Based on Chaotic Maps. IEEE Access 8: 66150-66162 (2020) - Masoumeh Safkhani, Samad Rostampour, Ygal Bendavid, Nasour Bagheri
:
IoT in medical & pharmaceutical: Designing lightweight RFID security protocols for ensuring supply chain integrity. Comput. Networks 181: 107558 (2020) - David Fifield:
Turbo Tunnel, a good way to design censorship circumvention protocols. FOCI @ USENIX Security Symposium 2020 - 2019
- Surjit Paul, Sanjay Kumar, Rajiv Ranjan Suman:
A Quantum Secure Entity Authentication Protocol Design for Network Security. Int. J. Inf. Secur. Priv. 13(4): 1-11 (2019) - Ye Lu, Tao Feng:
Cryptography Security Designs and Enhancements of DNP3-SA Protocol Based on Trusted Computing. Int. J. Netw. Secur. 21(1): 130-136 (2019) - Dongyang Xu
, Pinyi Ren
, James A. Ritcey:
PHY-Layer Cover-Free Coding for Wireless Pilot Authentication in IoV Communications: Protocol Design and Ultra-Security Proof. IEEE Internet Things J. 6(1): 171-187 (2019) - Ming Zhang:
Optimization design of encryption protocol in network security protocol based on wireless network development. J. Intell. Fuzzy Syst. 37(5): 6099-6106 (2019) - Dongyang Xu
, Pinyi Ren
, James A. Ritcey:
Independence-Checking Coding for OFDM Channel Training Authentication: Protocol Design, Security, Stability, and Tradeoff Analysis. IEEE Trans. Inf. Forensics Secur. 14(2): 387-402 (2019) - Ke Zang, He Xu, Feng Zhu, Peng Li:
Analysis and Design of Group RFID Tag Security Authentication Protocol. CISIS 2019: 637-645 - Wenzhu You, Haibo Ge:
Design and Implementation of Modbus Protocol for Intelligent Building Security. ICCT 2019: 420-423 - Steffen Pfrang, Mark Giraud, Anne Borcherding, David Meier, Jürgen Beyerer:
Design of an Example Network Protocol for Security Tests Targeting Industrial Automation Systems. ICISSP 2019: 727-738 - Arastoo Bozorgi, Mahya Soleimani Jadidi, Jonathan Anderson:
Challenges in Designing a Distributed Cryptographic File System. Security Protocols Workshop 2019: 177-192 - Arastoo Bozorgi, Mahya Soleimani Jadidi, Jonathan Anderson:
Challenges in Designing a Distributed Cryptographic File System (Transcript of Discussion). Security Protocols Workshop 2019: 193-199 - Dongyang Xu, Pinyi Ren, James A. Ritcey:
Independence-Checking Coding for OFDM Channel Training Authentication: Protocol Design, Security, Stability, and Tradeoff Analysis. CoRR abs/1901.07897 (2019) - Masoumeh Safkhani, Ygal Bendavid, Samad Rostampour, Nasour Bagheri:
On Designing Lightweight RFID Security Protocols for Medical IoT. IACR Cryptol. ePrint Arch. 2019: 851 (2019) - 2018
- Alicia Filipiak:
Design and formal analysis of security protocols, an application to electronic voting and mobile payment. (Conception et analyse formelle de protocoles de sécurité, une application au vote électronique et au paiement mobile). University of Lorraine, Nancy, France, 2018 - Phuc V. Trinh, Thanh V. Pham, Ngoc T. Dang
, Hung Viet Nguyen
, Soon Xin Ng
, Anh T. Pham
:
Design and Security Analysis of Quantum Key Distribution Protocol Over Free-Space Optics Using Dual-Threshold Direct-Detection Receiver. IEEE Access 6: 4159-4175 (2018) - Trio Adiono, Bryan Tandiawan, Syifaul Fuada:
Device Protocol Design for Security on Internet of Things based Smart Home. Int. J. Online Eng. 14(7): 161-170 (2018) - Hong Sun, Cheng Su
, Shi-Ping Chen:
A High Security RFID System Authentication Protocol Design Base on Cloud Computer. Wirel. Pers. Commun. 102(2): 1255-1267 (2018) - Juan Zhao, Xiaolong Xu:
Protocol Design of Efficient Access for Laptop in Wi-Fi Networks with Guaranteed Security. CSPS (1) 2018: 598-604 - Kailong Wang:
Analyzing Security and Privacy in Design and Implementation of Web Authentication Protocols. ICFEM 2018: 441-445 - Abdelkader Laouid, Muath AlShaikh, Farid Lalem, Ahcène Bounceur, Reinhardt Euler, Madani Bezoui, Habib Aissaoua, Abdelkamel Tari:
A distributed security protocol designed for the context of internet of things. ICFNDS 2018: 26:1-26:5 - 2017
- Vinay K. Sriram, Doug Montgomery:
Design and analysis of optimization algorithms to minimize cryptographic processing in BGP security protocols. Comput. Commun. 106: 75-85 (2017) - Remi Garcia, Paolo Modesti
:
An IDE for the Design, Verification and Implementation of Security Protocols. ISSRE Workshops 2017: 157-163 - Byunghoon Song, Yoonchae Cheong, Taehyun Lee, Jongpil Jeong
:
Design and Security Analysis of Improved Identity Management Protocol for 5G/IoT Networks. WorldCIST (2) 2017: 311-320 - 2016
- Ali Kartit, Hamza Kamal Idrissi, Mohamed Belkhouraf:
Improved Methods and Principles for Designing and Analyzing Security Protocols. Int. J. Netw. Secur. 18(3): 523-528 (2016) - Aamir Shahzad, Malrey Lee, Changhoon Lee
, Naixue Xiong, Suntae Kim, Young Keun Lee, Kangmin Kim, Seon-Mi Woo, Gisung Jeong:
The protocol design and New approach for SCADA security enhancement during sensors broadcasting system. Multim. Tools Appl. 75(22): 14641-14668 (2016) - Woo-Sik Bae:
Designing and verifying a P2P service security protocol in M2M environment. Peer Peer Netw. Appl. 9(3): 539-545 (2016) - Samta Gajbhiye, Monisha Sharma, Sanjeev Karmakar, Sanjay Sharma:
Design, implementation and security analysis of Bluetooth pairing protocol in NS2. ICACCI 2016: 1711-1717 - Eduard Grasa
, Ondrej Rysavý, Ondrej Lichtner, Hamid Asgari, John Day, Lou Chitkushev:
From protecting protocols to layers: Designing, implementing and experimenting with security policies in RINA. ICC 2016: 1-7
skipping 77 more matches
loading more results
failed to load more results, please try again later

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
retrieved on 2021-01-27 03:18 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint